Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: public access points  (Read 2655 times)

0 Members and 1 Guest are viewing this topic.

hot dog

  • Guest
public access points
« on: June 10, 2009, 11:54:47 PM »
Is using HTTPS sufficient enough when using public wireless access points?  For instance, would I be safe checking my online bank statement using a public access point, if the bank website uses HTTPS for encrypting data?

Rob Pomeroy



    Prodigy

  • Systems Architect
  • Thanked: 124
    • Me
  • Experience: Expert
  • OS: Other
Re: public access points
« Reply #1 on: June 11, 2009, 01:47:51 AM »
Not if the workstation has been compromised and a keylogger installed.  Never trust hardware you don't control!  It's far safer to call your bank on the phone.
Only able to visit the forums sporadically, sorry.

Geek & Dummy - honest news, reviews and howtos

hot dog

  • Guest
Re: public access points
« Reply #2 on: June 11, 2009, 02:37:18 AM »
Are you saying that if a hacker was using the same access point as me, he could install a keylogger into my system?

Software firewalls don't make any difference?

Rob Pomeroy



    Prodigy

  • Systems Architect
  • Thanked: 124
    • Me
  • Experience: Expert
  • OS: Other
Re: public access points
« Reply #3 on: June 11, 2009, 05:16:26 AM »
Sorry - I misread your original question.  I thought you were talking about public access terminals.  Public wireless generally is not significantly less secure than your own wireless setup at home.  SSL over HTTP does improve your chances of keeping your transaction encrypted, secure and private and a cracker would have to be pretty determined to get anywhere.

The risk is that the system you're using is compromised in such a way that it transparently shows you a bogus website in place of your bank's real website.  That's unlikely, but with router DNS attacks being on the rise, it's one of the most significant attack vectors in the scenario you're contemplating.

The other risk is a sniffing attack but your SSL transaction would be very difficult to penetrate.
Only able to visit the forums sporadically, sorry.

Geek & Dummy - honest news, reviews and howtos

hot dog

  • Guest
Re: public access points
« Reply #4 on: June 11, 2009, 11:23:51 AM »
The risk is that the system you're using is compromised in such a way that it transparently shows you a bogus website in place of your bank's real website.  That's unlikely, but with router DNS attacks being on the rise, it's one of the most significant attack vectors in the scenario you're contemplating.

I think I've read about this, isn't is called "pharming" or somthin like that...When a hacker hacks the server of the website you are accessing and resolves your IP address to a look-alike, phony website..?

Rob Pomeroy



    Prodigy

  • Systems Architect
  • Thanked: 124
    • Me
  • Experience: Expert
  • OS: Other
Re: public access points
« Reply #5 on: June 12, 2009, 03:35:18 AM »
It's more scary than that.  You know how most people access the internet through a router?  Those routers can be reprogrammed so that when the home user tries to go to ABC Bank, the router goes off to a criminal's replica of that bank's website.  This is done in such a way that the end user would not be aware of the redirection.  To be honest, even hardened gurus would find it difficult to spot such a thing.  It is vitally important that routers are secure, that their web interfaces are not accesible from the internet and that the passwords are not left at their default.
Only able to visit the forums sporadically, sorry.

Geek & Dummy - honest news, reviews and howtos

hot dog

  • Guest
Re: public access points
« Reply #6 on: June 12, 2009, 03:46:42 AM »
It's more scary than that.  You know how most people access the internet through a router?  Those routers can be reprogrammed so that when the home user tries to go to ABC Bank, the router goes off to a criminal's replica of that bank's website.  This is done in such a way that the end user would not be aware of the redirection.  To be honest, even hardened gurus would find it difficult to spot such a thing.  It is vitally important that routers are secure, that their web interfaces are not accesible from the internet and that the passwords are not left at their default.

woe :o

If you suspect that your router has been reprogrammed, what could you do about it?

Rob Pomeroy



    Prodigy

  • Systems Architect
  • Thanked: 124
    • Me
  • Experience: Expert
  • OS: Other
Re: public access points
« Reply #7 on: June 12, 2009, 05:08:17 AM »
Factory reset.
Only able to visit the forums sporadically, sorry.

Geek & Dummy - honest news, reviews and howtos

hot dog

  • Guest
Re: public access points
« Reply #8 on: June 12, 2009, 01:26:09 PM »
thanks, sir  8)